You are on page 1of 12

Question 1

2 out of 2 points
Examples of volatile storage are mass storage devices such as disks and
tapes.
Selected Answer:
Correct Answer:

False
False

Question 2

0 out of 2 points
It is the responsibility of the ____________________ to safeguard the
password file that stores all valid user name/password combinations.
Selected Answer:
Correct Answer:
Evaluation Method

user
Correct Answer

Exact Match

OS

Exact Match

operating system

Exact Match

OS (operating
system)

Exact Match

operating system
(OS)

Case Sensitivity

Question 3

0 out of 2 points
The first line of defense against illicit use of, or threats to, computer
resources and sensitive information is a strong ____ and authorization
process.
Selected Answer:
Correct Answer:

encryption
authentication

Question 4

0 out of 2 points
____ games allow a large number of players, often thousands or tens of
thousands, to interact, form groups, and compete against one another
within a simulated virtual world.
Selected Answer:

MMRPG
Correct Answer:

MMOG

Question 5

2 out of 2 points
The history of mathematics begins ____ years ago.
Selected Answer:
Correct Answer:

3,000 or more
3,000 or more

Question 6

0 out of 2 points
The ____ was the first fully electronic general-purpose programmable
computer.
Selected Answer:

Mark I

Correct Answer:

ENIAC

Question 7

2 out of 2 points
A(n) ____ handles the details of input/output and compensates for any
speed differences between I/O devices and other parts of the computer.
Selected Answer:
Correct Answer:

I/O controller
I/O controller

Question 8

0 out of 2 points
The ____ are the devices that allow a computer system to communicate
and interact with the outside world as well as store information.
Selected Answer:
Correct Answer:
Question 9

registers
input/output units

0 out of 2 points
The sequence of operations that must be completed successfully to
produce a realistic three-dimensional image sequence is termed the ____.
Selected Answer:

graphics perspective

Correct Answer:

graphics pipeline

Question 10

0 out of 2 points
Wireless communications are a(n) ____________________-generation
innovation in computing.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match

first
Correct Answer

Case Sensitivity

fifth

Question 11

0 out of 2 points
One way to achieve speedup in real-time graphics is to avoid the use of
____________________ that, although they produce high-quality images,
simply take too much time.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match

gif
Correct Answer

Case Sensitivity

algorithms

Question 12

2 out of 2 points
____, such as text editors, are sometimes organized into collections called
program libraries.
Selected Answer:
Correct Answer:
Question 13

Utilities
Utilities

0 out of 2 points
The ____ of a disk is the time needed to position the read/write head over
the correct track.
Selected Answer:

latency

Correct Answer:

seek time

Question 14

0 out of 2 points
In 1952, a UNIVAC I cost $12 million.
Selected Answer:
Correct Answer:

True
False

Question 15

0 out of 2 points
Leibnizs ____________________ could carry out addition, subtraction,
multiplication, and division.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match

calculator
Correct Answer

Case Sensitivity

Wheel

Question 16

2 out of 2 points
Algorithms usually contain a set of instructions to be executed in any
order.
Selected Answer:
Correct Answer:

False
False

Question 17

0 out of 2 points
In a ____, the original contents of the memory cell are unchanged.
Selected Answer:
Correct Answer:

random access memory


nondestructive fetch

Question 18

2 out of 2 points
The exchange of setup information between the client and server,
preparatory to exchanging real data, is known as a ____.
Selected Answer:
Correct Answer:

handshake
handshake

Question 19

0 out of 2 points
In a ____ cipher a single letter of plaintext generates a single letter of
ciphertext.
Selected Answer:
Correct Answer:

shift
substitution

Question 20

0 out of 2 points
System software acts as a(n) ____ between the users and the hardware.
Selected Answer:
Correct Answer:

translator
intermediary

Question 21

0 out of 2 points
The star topology connects the network nodes in a circular fashion, with
messages circulating in either a clockwise or counterclockwise direction
until they reach their destination.
Selected Answer:
Correct Answer:

True
False

Question 22

2 out of 2 points
____ is the ability to share physical resources, such as a printer or storage
device, as well as logical resources, such as software and information.

Selected Answer:

Resource sharing

Correct Answer:

Resource sharing

Question 23

0 out of 2 points
While WiMAX is great for communicating with a nearby router, its
transmission limit means it cannot provide mobile Internet access from a
car or outdoor site far from any base station.
Selected Answer:
Correct Answer:

True
False

Question 24

0 out of 2 points
Related recordssay, the records of all the employees in a single
companyare kept in a ____.
Selected Answer:

data network

Correct Answer:

data file

Question 25

2 out of 2 points
Any positive ____________________ is either a prime number or a number
that can be written in a unique way as a product of prime factors.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match

integer
Correct Answer

Case Sensitivity

integer

Question 26

2 out of 2 points
A standard data DVD holds ____ GB of data.
Selected Answer:
Correct Answer:

4.7
4.7

Question 27

2 out of 2 points
A text file can be hidden in an image file by changing (if needed) the least
significant bit of each byte of the image file to match the
____________________ form of the characters in the text.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match

binary
Correct Answer

Case Sensitivity

binary

Question 28

2 out of 2 points
The ____ hides from the user the messy details of underlying hardware.
Selected Answer:
Correct Answer:

interface
interface

Question 29

0 out of 2 points
Building massive, integrated government databases raises fewer technical
questions than legal, political, social, and ethical ones.
Selected Answer:
Correct Answer:

False
True

Question 30

2 out of 2 points
Icons displayed on the screen are selected with a mouse and a button
using a technique called ____.
Selected Answer:
Correct Answer:
Question 31

0 out of 2 points
Translators for ____ are called compilers.

point-and-click
point-and-click

Selected Answer:
Correct Answer:

machine language
high-level languages

Question 32

2 out of 2 points
In the SIMD parallel processing model, the control unit ____ instructions to
every ALU.
Selected Answer:
Correct Answer:

broadcasts
broadcasts

Question 33

2 out of 2 points
____ are fully modeled and fully rendered objects stored in a video library
in video memory.
Selected Answer:
Correct Answer:

Cut-ins
Cut-ins

Question 34

0 out of 2 points
____ allow the physical data to reside at separate and independent
locations that are electronically networked together.
Selected Answer:
Correct Answer:

Discrete databases
Distributed databases

Question 35

2 out of 2 points
To solve the problem of two users having the same password, some
operating systems keep a third entry for each user in the password file,
namely ____ at which the user created the password.
Selected Answer:

the exact time

Correct Answer:

the exact time

Question 36

0 out of 2 points
____ means keeping information securethat is, protected from those who
should not have access to it.
Selected Answer:
Correct Answer:

Information assurance
Information security

Question 37

2 out of 2 points
In theoretical computer science, researchers study the logical and ____ of
problems and their solutions.
Selected Answer:
Correct Answer:

mathematical properties
mathematical properties

Question 38

2 out of 2 points
A ____ executes instructions in parallel with the CPU, the main processor,
and carries out all graphics operations including modeling, motion,
rendering, and display.
Selected Answer:

GPU

Correct Answer:

GPU

Question 39

0 out of 2 points
Charles Babbage gave up on his second ____________________ because the
current technology could not support his project.
Selected Answer:
Correct Answer:
Evaluation Method
Exact Match

calculator
Correct Answer
Difference Engine

Case Sensitivity

Question 40

2 out of 2 points
Atari released its first product in 1974, an arcade game called ____.
Selected Answer:
Correct Answer:

Pong
Pong

Question 41

2 out of 2 points
The main difficulty with a symmetric algorithm is how to securely transmit
the secret key.
Selected Answer:
Correct Answer:

True
True

Question 42

0 out of 2 points
A block cipher encodes one character at a time.
Selected Answer:
Correct Answer:

True
False

Question 43

2 out of 2 points
The instructions that can be decoded and executed by the control unit of a
computer are represented in machine language.
Selected Answer:
Correct Answer:

True
True

Question 44

2 out of 2 points
A movie is an interactive environment.
Selected Answer:
Correct Answer:

False
False

Question 45

0 out of 2 points
In the early 1980s, TCP/IP was used only in the United States.

Selected Answer:
Correct Answer:

True
False

Question 46

2 out of 2 points
An operation that is unambiguous is called a ____ operation of the
computing agent carrying out the algorithm.
Selected Answer:
Correct Answer:

primitive
primitive

Question 47

0 out of 2 points
The first slide rule appeared around ____.
Selected Answer:
Correct Answer:

1183
1622

Question 48

2 out of 2 points
____ operation codes are restricted to be used in the operating system or
other system software.
Selected Answer:
Correct Answer:

Privileged
Privileged

Question 49

0 out of 2 points
A database management system works much like a simple file manager.
Selected Answer:
Correct Answer:

True
False

Question 50

0 out of 2 points
During the ____ generation of computing, the desktop machine shrunk to
the size of a typewriter.

Selected Answer:
Correct Answer:
Thursday, November 12, 2015 12:30:08 AM EST
OK

third
fourth

You might also like